Prior to 3385, the user-controlled role parameter enters the application in the Kubernetes::RoleVerificationsController. The role parameter flows into the RoleConfigFile initializer and then into the Kubernetes::Util.parse_file method where it is unsafely deserialized using the YAML.load_stream method. This issue may lead to Remote Code Execution (RCE). This vulnerability is fixed in 3385.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-39572 Prior to 3385, the user-controlled role parameter enters the application in the Kubernetes::RoleVerificationsController. The role parameter flows into the RoleConfigFile initializer and then into the Kubernetes::Util.parse_file method where it is unsafely deserialized using the YAML.load_stream method. This issue may lead to Remote Code Execution (RCE). This vulnerability is fixed in 3385.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 20 Aug 2024 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Zendesk
Zendesk samson
CPEs cpe:2.3:a:zendesk:samson:*:*:*:*:*:*:*:*
Vendors & Products Zendesk
Zendesk samson
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 20 Aug 2024 20:30:00 +0000

Type Values Removed Values Added
Description Prior to 3385, the user-controlled role parameter enters the application in the Kubernetes::RoleVerificationsController. The role parameter flows into the RoleConfigFile initializer and then into the Kubernetes::Util.parse_file method where it is unsafely deserialized using the YAML.load_stream method. This issue may lead to Remote Code Execution (RCE). This vulnerability is fixed in 3385.
Title GHSL-2023-136_Samson
Weaknesses CWE-502
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-08-20T20:53:00.400Z

Reserved: 2024-07-30T14:01:33.923Z

Link: CVE-2024-42363

cve-icon Vulnrichment

Updated: 2024-08-20T20:52:51.961Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-08-20T21:15:14.543

Modified: 2024-08-21T12:30:33.697

Link: CVE-2024-42363

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.